Catalog Search Results
1) Black widow
Author
Formats
Description
Entreated by his goddaughter to help pay off a blackmailer who videotaped her bachelorette party and then threatened to expose her debauchery, Doc Ford reluctantly agrees and then finds himself in danger when the extortionist releases the tape anyway.
2) Wildcard
Author
Appears on list
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
5) Corsair
Author
Description
"In the early 2020s, two young, genius computer hackers, Elizabeth Santiago and David Schwartz, meet at MIT, where Schwartz is sneaking into classes, and have a brief affair. David is amoral and out for himself, and soon disappears. Elizabeth dreams of technology and space travel and takes a military job after graduating. Nearly ten years later, David is setting himself to become a billionaire by working in the shadows ... and Elizabeth works in intelligence...
7) Chat
Author
Description
"When a wintertime car accident leaves his mother and brother seriously injured, Joe Gunther takes a leave of absence to attend to them and investigate the cause of the crash"--Provided by publisher.
8) Warcross
Author
Appears on list
Description
Teen hacker Emika Chen works as a bounty hunter, tracking down Warcross players who bet on the game illegally. To earn some quick cash, Emika hacks into the game -- only to glitch herself into the action and become an overnight sensation. When Emika gets a call from the game's creator, the young billionaire Hideo Tanaka, he makes her an offer she can't refuse, and suddenly Emika's whisked off to Tokyo into a world of fame and fortune. But the more...
9) Quantum
Author
Formats
Description
On the eve of a top secret space mission, Captain Calli Chase detects a tripped alarm in the tunnels deep below a NASA research center. A NASA pilot, quantum physicist, and cybercrime investigator, Calli knows that a looming blizzard and government shutdown could provide the perfect cover for sabotage, with deadly consequences. A spatter of dried blood, a missing security badge, a suspicious suicide--a series of disturbing clues point to Calli's twin...
10) Wired
Author
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
11) 1st case
Author
Formats
Description
"Recruited into the FBI when her unorthodox programming skills get her kicked out of MIT, a computer genius tracks a killer who has been targeting young women through a sophisticated messaging app."--
Author
Formats
Description
"When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown, or was the yacht abandoned when he came aboard? For reasons he cannot explain, Kurt doesn't trust either version of his recollection. Determined to know the truth, he begins to search for answers, and soon finds himself descending into a shadowy world of state-sponsored...
Author
Formats
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
14) The Fox
Author
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request